<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>03140nam a22002417a 4500</leader>
  <controlfield tag="005">20251030150314.0</controlfield>
  <controlfield tag="008">251030b        |||||||| |||| 00| 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780367240233</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">AL</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">English</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
    <subfield code="a">005.82</subfield>
    <subfield code="b">SAVB</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Onur Savas Ed</subfield>
    <subfield code="9">243256</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Big data analytics in cybersecurity</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boca Raton</subfield>
    <subfield code="b">CRC Press</subfield>
    <subfield code="c">2025</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xvi,336p.</subfield>
    <subfield code="b">HB</subfield>
    <subfield code="c">23.5x16cm.</subfield>
  </datafield>
  <datafield tag="365" ind1=" " ind2=" ">
    <subfield code="a">4224</subfield>
    <subfield code="b">&#x20B9;2796.00</subfield>
    <subfield code="c">&#x20B9;</subfield>
    <subfield code="d">&#x20B9;3495.00</subfield>
    <subfield code="e">20%</subfield>
    <subfield code="f">23-10-2025</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, o&#xFB00;ers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators.
Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes.

Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes.

Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include:

Network forensics
Threat analysis
Vulnerability assessment
Visualization
Cyber training.
In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined.
The book &#xFB01;rst focuses on how big data analytics can be used in di&#xFB00;erent aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.
</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Internet&#x2010;security measures</subfield>
    <subfield code="9">243224</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Database security</subfield>
    <subfield code="9">243225</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Computer networks &#x2013; security measures</subfield>
    <subfield code="9">243226</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Deng,Julia Ed</subfield>
    <subfield code="9">243237</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">240614</subfield>
    <subfield code="d">240614</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">ISE</subfield>
    <subfield code="a">SE</subfield>
    <subfield code="b">SE</subfield>
    <subfield code="d">2025-10-27</subfield>
    <subfield code="e">Biblios Book Point, Surathkal-575014</subfield>
    <subfield code="g">2796.00</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.82 SAVB</subfield>
    <subfield code="p">SE000140</subfield>
    <subfield code="r">2025-10-30 11:46:26</subfield>
    <subfield code="v">3495.00</subfield>
    <subfield code="w">2025-10-23</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
